Sec Pro 10.5-6 Mobile Device Security and Management

Quiz
•
Computers
•
11th Grade
•
Hard
Ryan Sigmon
Used 4+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A software technician presents a forum on sideloading and jailbreaking to a group of new mobile users.
Which of the following points will the technician include in their discussion of the use of jailbreaking? (Select two.)
It is a method used to gain elevated privileges and access to system files on mobile devices.
It provides the ability to share internet connectivity to other devices.
It refers to the installation of applications from sources other than the official application store of the platform.
It does not undergo the same scrutiny and vetting process as those on official application stores.
It allows users to install unauthorized applications and customize device appearance and behavior.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following mobile device security considerations disables the ability to use the device after a short period of inactivity?
Screen lock
Remote wipe
GPS
TPM
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
A cyber team presents a discussion on the use of sideloading and jailbreaking to a group of board members.
Which of the following BEST describes sideloading? (Select two.)
It provides the ability to share internet connectivity to other devices.
It is a method used to gain elevated privileges and access to system files on mobile devices.
It refers to the installation of applications from sources other than the official application store of the platform.
It does not undergo the same scrutiny and vetting process as those on official application stores.
It allows users to install unauthorized applications and customize device appearance and behavior.
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
An IT security specialist at a mid-size corporation observes a trend of unauthorized apps appearing on company-provided mobile devices. The specialist suspects the employees are either sideloading apps or have jailbroken their devices.
What steps should the security specialist take to verify the cause of the unauthorized applications and to re-establish proper security protocols? (Select two.)
Purchase new mobile devices to replace all current ones.
Implement mobile device management (MDM) policies to restrict unauthorized application installation.
Implement a credential management policy.
Hire external IT consultants to manage mobile device usage.
Conduct device audits to identify unauthorized applications and to detect any signs of jailbreaking or sideloading.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A smartphone was lost at the airport. There is no way to recover the device.
Which of the following ensures data confidentiality on the device?
GPS
TPM
Screen lock
Remote wipe
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the recommend Intune configuration?
Account portal
Hybrid MDM
Company portal
Intune Standalone
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a solution that pushes security policies directly to mobile devices over a network connection?
Credential Manager
Group Policy
Mobile device management (MDM)
Application Control
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
Mobile Devices

Quiz
•
University
20 questions
Mobile Data Management Quiz

Quiz
•
University
17 questions
Ch 4 Responsive design with Elementor

Quiz
•
9th Grade - University
20 questions
Component 3: A1 Modern Technologies

Quiz
•
10th - 11th Grade
20 questions
QUIZ 4 Mobile App Development Quiz

Quiz
•
University
16 questions
Device Configuration and Management- Domains 3 & 4

Quiz
•
9th - 12th Grade
15 questions
Digital Devices

Quiz
•
1st - 12th Grade
20 questions
IT Essentials Ch 7 Review - Laptops and Mobile Devices

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade